Abstract
Authentication and verification of digital data is important phase in internet based transaction and data access. For the authentication and verification used digital signature operation. For the operation of digital signature various cryptography techniques is used. The strength of cryptography technique measures the strength of digital signature. For the strength improvement various cryptography techniques is used such as RSA, ECC and some other bit level cryptography technique. In this paper present the review of digital signature technique basically based on elliptic curve cryptography technique. The elliptic curve cryptography technique is much stronger than other cryptography technique.Â
Highlights
The processes of authentication of digital data over internet checks and verify the content of data received by the receiver is original and not tampered
Some cryptography technique based on symmetric key cryptography and some are based on asymmetric key cryptography
Any involved party must register his public key with a central authority, which is known as the Certificate Authority (CA)
Summary
The processes of authentication of digital data over internet checks and verify the content of data received by the receiver is original and not tampered. For the process of authentication used various cryptography techniques. The process of digital signature authenticates the data and content of message from the both side sender and receiver. In the process of sender and receiver send the electronic document for another party. For authentication of sender and receiver used various message protocol by different user in concern of content validation. For the improvement of the strength of digital signature used various cryptography and hash function. A day’s various authors used cure based function for the authentication of digital signature. The curve cryptography technique is used point and coordinate distribution function for the mapping and signature of data. He/she sends the generated signature, a document and his\her public key to any verifier. A verifier can check the validity of the signature with the corresponding public key.
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have
More From: INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY
Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.